FEASIBILITY ANALYSIS OF FOUNDING SMART CITY BY LEVERAGING THE NAMED DATA NETWORKING OF THINGS (NDNOT) TECHNOLOGY | Author : Pranshul Pahwa | Abstract | Full Text | Abstract :Objectives: The paper shows the model for Smart City based on Named Data Network (NDN). In country like
India an effective model based on NDN like ours will be very useful for managing traffics. Methods/Analysis:
NDN is an upcoming technology, which is believed that it will replace Internet. The Internet Protocol version 6
(IPv6) will exhaust with the growing rate of connected devices. The paper proposes a complete model based on
Named Data Networking of Things (NDNoT) expanding the idea of Internet of Things (IoT) for not only managing
the traffic but also for helping accidental cases. The model uses sensors to convey information to the cloud server
from where it can be distributed to concerned authorities and person using NDN as the infrastructure. The paper
covers the whole algorithm for designing the model. Findings: Issues like Security, Congestion, Routing,
Reliability and Speed are improved to an extend in NDNoT as compared to the models based on IoT due to its
principles of allocations depending on Hierarchal names with signatures. Improvement: The model can be
practically implemented using NDN. |
| DEVELOPING AN INTEGRATED MODEL BASED ON THE PROBABILISTIC NEURAL NETWORK (PNN) IN THE EARLY DETECTION AND PREDICTION OF AN IMPENDING EARTHQUAKE | Author : Romharsh Mittal | Abstract | Full Text | Abstract :A wide variety of tragedies happen over the globe; the forecast of such catastrophe is imperative for early
safeguard and clearing process. The expectation of a quake could be accomplished used antecedents or
seismographic information; however, all such strategies can be completed distinctly by the area specialists
(seismologist). Information mining strategies have been utilized in a wide assortment of utilizations and different
areas. It permitted the forecast of execution and expected movement, which empowers the inference of wise
choices. Forecasting earthquake history information can be accomplished by utilizing information mining ideas.
In this paper, an expectation model is proposed for envisioning seismic tremors by applying clustering and
affiliation rule mining on quake history information. At first, the data is gathered, and they are bunched, this
grouped information is passed to the next stage where successive examples are acquired by applying affiliation
rule mining, at long last by utilizing the case, the future quakes are anticipated by performing rule coordinating.
This paper focuses on a prescient model using noteworthy quake information and mining strategies, which
predicts the fore coming earthquake. This expectation model can be utilized to anticipate different seismic
occasions, and they can be used for making a forecast in various fields by using a fitting dataset. |
| Evaluation of Text Classifier Based on Different Stemming Algorithms | Author : Ebtehal Talib Kudair | Abstract | Full Text | Abstract :Text classification is an important field of machine learning, is a supervised learning method and it depends on dividing texts
into groups according to the predefined categories. In general, the text carries a lot of information but in an unstructured
form, and this unstructured datamust be converted into structured data.In this paper, texts will be classified using the traditional
k-Nearest Neighbor algorithm (KNN), and the performance of the KNN classification algorithm will be compared through
text preprocessing with the use of different stemming algorithms such as (Porter Stemmer, Snowball Stemmer). The snowball
stemmer reduced the number of featuresin comparisonwith porterstemmer, thusthe results proved that the classifier are more
accurate when using snowball stemmer. |
| DEVELOPING AN ARDUINO DEVELOPMENT BOARD FOR AUTOMATION SPECIFICATIONS FOR DIFFERENTLY ABLED TO FACILITATE HOME AUTOMATION | Author : Atul Kalkhanda | Abstract | Full Text | Abstract :Nowadays home appliances can be operated by a single touch or click, which is now becoming a part of our
life. Our research mainly focuses on the operating of devices through the help of an android app. This app is
mainly designed for the blind, deaf and dumb. This system has an AT mega 328p microcontroller on an Arduino
development board, an HC-05 Bluetooth module, a Relay module, LCD display. For the visually impaired
voice-controlled automation is provided, while for the deaf and the dumb keypad control through the android
device is arranged. With the help of ‘AMR Voice’ App and ‘Blynk’ app installed on an android phone, the
connection is established with the HC-05 Bluetooth module, through which the voice commands/ keypad
commands are sent over to the microcontroller. Based on the received command relevant action is taken upon
the home appliance and the status of the appliance is reported on the LCD display and sounded by the buzzer. |
| IT Security – Threats, Measures and Way Forward | Author : Arham Rahat | Abstract | Full Text | Abstract :The dependency on cyberspace by an entity becomes an area of corporate protection increasingly relevant in todays
information era. As businesses and various organizations rely more on the cyber world for their day-to-day
transactions, the benefits also come with certain IT security risks. In fact, the vulnerability to national security has
risen significantly, provided that various organizations networks are tied together in cyberspace. Cyber protection is
constantly endangered. The confidentiality of data is a big concern for cloud consumers. Individual consumers on
social network platforms are becoming highly knowledgeable and vulnerable to private details. The top three obstacles
in executing effective cloud strategy differ dramatically as per the new International Information Community study
among IT and business line firm. With IT, protection issues are (66%), and 42% of the cloud-based ventures have been
sent home with security concerns (65%) (Kumar & More 2014).
Any company has a duty to secure private or certificate knowledge or data from abroad. Safety initiatives provide
security of passwords, app fixes, firewalls, intrusion protection, verification, authorization, auditing, and risk
evaluation. During the literature analysis, several organizations have noticed that data protection standards are not
being practiced. The result is that analysis is necessary to identify a systematic solution to securing classified
information, irrespective of the business sector, and to take effective action. |
| Leveraging the K-Means and K-Methods Algorithms to Analyse Student Performance | Author : Aditya Goel | Abstract | Full Text | Abstract :Nowadays, AI is used in every field whether it is education, defence, or enterprise. Its significance turns out to be
more of a direct result of things to come of the students. Training information small scale ng is precious because
the measure of information in the instruction framework is expanding step by step in advanced education is
moderately new; however, its significance builds due to expanding database. There are many methodologies for
estimating the students exhibition. K-means is one of generally effective and most used technique. With the
assistance of information mining, the shrouded data in the database is extracted, which enables to develop
students research. The decision tree is similarly a strategy used to foresee the students exhibition. Latter, the
most significant difficulties that educational foundations confront are the more development of information and
the utilization of this information to improve quality which can help them to make better choices and judgement.
Furthermore, grouping is one of the fundamental strategies used regularly in dissecting informational collections.
This research applies a cluster test to portion students into groups, indicated by their qualities. Unsupervised
learning, like K-means, is discussed. Training data mining is explained to examine the information accessible in
the instruction field to bring the shrouded information, for example, essential and valuable data from it. With the
assistance of mentioned techniques, it is anything but difficult to improve the outcome and fate of students. |
| Developing Smart and Innovative Farming Techniques by Selectively Using Internet of Things (IOT) In Agribusiness Industry | Author : Saatvik Wadhwa | Abstract | Full Text | Abstract :IoT innovation assumes a huge part in the agribusiness industry. The new insights show that the total populace is in the
place of reach more than 9 billion in the year 2050. The farming business needs to take on intelligent innovation to take
care of this huge populace. The horticulture Industry relies upon creative plans to oversee developing interest in food.
The agribusiness activities need keen arrangements from IoT by presenting satellite availability and using cell
organizations. The whole Agriculture framework is further developed utilizing IoT based Smart Farming checking the
field progressively. IoT in agriculture helps farmers in reducing extra expenses like electricity and water bill by using
sensors and interconnectivity |
|
|